Sciweavers

480 search results - page 35 / 96
» Anonymous Transactions in Computer Networks
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
Wire-speed total order
— Many distributed systems may be limited in their performance by the number of transactions they are able to support per unit of time. In order to achieve fault tolerance and to...
Tal Anker, Danny Dolev, G. Greenman, I. Shnaiderma...
PERCOM
2009
ACM
14 years 3 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
SRDS
1995
IEEE
14 years 7 days ago
Supporting Semantics-Based Transaction Processing in Mobile Database Applications
Advances in computer and telecommunication technologies have made mobile computing a reality. However, greater mobility implies a more tenuous network connection and a higher rate...
Gary D. Walborn, Panos K. Chrysanthis
ANCS
2010
ACM
13 years 6 months ago
The case for hardware transactional memory in software packet processing
Software packet processing is becoming more important to enable differentiated and rapidly-evolving network services. With increasing numbers of programmable processor and acceler...
Martin Labrecque, J. Gregory Steffan
CONEXT
2009
ACM
13 years 9 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...